The arrival of Russian President Vladimir Putin to power in the Russian Federation is an important factor in delineating a new approach to Russian policy towards regions that have great strategic importance affecting its national security. Therefore, NATO's progress eastward towards these regions prompts Russia to delineate a new strategy to confront this progress as well as preserving its control in the near neighboring regions represented by the countries of Eastern Europe, especially after the changes that occurred in those regions following the color revolutions that swept the region, such as the first application of this Russian policy in 2014, through the annexation of Crimea, and the latest military operations in Ukraine in 2022, which provoke reactions of Western countries, creating conditions for the return of the Cold War, and affecting the stability of the international system
The work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3)
... Show MoreOne of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"
versteht man, dass die Forschung sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F
... Show Moreالهدف من الدراسه تحضير فئه جديده من بوليمرات السليكون P1-P4 والتي تمت على اساس استحدام ثنائي مثيل ثنائي كلورو سيلان((DCDMS مع بعض المركبات العضويه التي تحتوي مجاميع الهيدروكسيل الطرفيه والتي حضرت لاول مره M1-M4، بأستخدم البلمره التكثيفيه .كما تم تحضير متراكباتها النانويهP′1-P′4 بوجود جسيمات الفضه النانويه (Ag-NPs) باستخدام طريقة صب المحاليل. شخصت جميع التراكيب للمونمرات والبوليمرات المحضره باستخدام مطيافية
... Show MoreA new ligand ( 4- methoxy benzoyl ) carbamothioyl ) Glycine (MCG) is synthesized by reaction of (4- methoxy benzoyl isothiocyanate) with Glycine(1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized byFT-IR,UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(MCG)2] where M2+ = Mn, Co, Ni, Cu, Zn, , Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is has square planer geometry.
This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreSynthesis and study liquid crystalline properties of new compounds with terminal groups of amides ([III]a-c,[IV]a-c and [VI]n), alkoxy series[V]n or ester with azo linkage ([IX]a-c and[X]a-c) containing thaizole ring. These series were synthesized by many steps starting from 4- hydroxyacetophenone or 4-aminoacetophenone. The synthesized compounds were characterized using melting points, FTIR, C.H.N.S analysis and for some of them 1H NMR spectroscopy. The liquid crystalline properties were studied by hot stage polarizing microscopy and differential scanning calorimetry DSC. All compounds of series [III]a-c,[IV]a-c and compounds [V]n showed enantiotropic liquid crystal. While the series [VI]n showed nematic mesomorphism except [VI]8 did not s
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More